Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000400

    <GroupDescription></GroupDescription>
    Group
  • The VMM must request data integrity verification on the name/address resolution responses the system receives from authoritative sources.

    &lt;VulnDiscussion&gt; If data origin authentication and data integrity verification is not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-OS-000401

    <GroupDescription></GroupDescription>
    Group
  • The VMM must perform data integrity verification on the name/address resolution responses the system receives from authoritative sources.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-OS-000402

    <GroupDescription></GroupDescription>
    Group
  • The VMM must perform data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.

    &lt;VulnDiscussion&gt;If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it m...
    Rule Medium Severity
  • SRG-OS-000403

    <GroupDescription></GroupDescription>
    Group
  • The VMM must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-OS-000404

    <GroupDescription></GroupDescription>
    Group
  • The VMM must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all VMM components.

    &lt;VulnDiscussion&gt;VMMs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized modifica...
    Rule Medium Severity
  • SRG-OS-000405

    <GroupDescription></GroupDescription>
    Group
  • The VMM must implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on all VMM components.

    &lt;VulnDiscussion&gt;VMMs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosu...
    Rule Medium Severity
  • SRG-OS-000408

    <GroupDescription></GroupDescription>
    Group
  • The VMM must maintain a separate execution domain for each executing process.

    &lt;VulnDiscussion&gt;VMMs can maintain separate execution domains for each executing process by assigning each process a separate address space. E...
    Rule Medium Severity
  • SRG-OS-000408

    <GroupDescription></GroupDescription>
    Group
  • The VMM must maintain a separate execution domain for each guest VM.

    &lt;VulnDiscussion&gt;VMMs can maintain separate execution domains for each executing guest VM by assigning each guest VM a separate address space....
    Rule Medium Severity
  • SRG-OS-000420

    <GroupDescription></GroupDescription>
    Group
  • The VMM must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring the VMM is implementing rate-limiting measures on impacted network interfaces.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-OS-000423

    <GroupDescription></GroupDescription>
    Group
  • The VMM must protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised as unprotected communicat...
    Rule Medium Severity
  • SRG-OS-000425

    <GroupDescription></GroupDescription>
    Group
  • The VMM must maintain the confidentiality and integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for examp...
    Rule Medium Severity
  • SRG-OS-000426

    <GroupDescription></GroupDescription>
    Group
  • The VMM must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...
    Rule Medium Severity
  • SRG-OS-000432

    <GroupDescription></GroupDescription>
    Group
  • The VMM must behave in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.

    &lt;VulnDiscussion&gt;A common vulnerability of VMM is unpredictable behavior when invalid inputs are received. This requirement guards against adv...
    Rule Medium Severity
  • SRG-OS-000433

    <GroupDescription></GroupDescription>
    Group
  • The VMM must implement non-executable data to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...
    Rule Medium Severity
  • SRG-OS-000433

    <GroupDescription></GroupDescription>
    Group
  • The VMM must implement address space layout randomization to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...
    Rule Medium Severity
  • SRG-OS-000437

    <GroupDescription></GroupDescription>
    Group
  • The VMM must remove all software components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the VMM after updates have been installed may be exploited...
    Rule Medium Severity
  • SRG-OS-000445

    <GroupDescription></GroupDescription>
    Group
  • The VMM must verify correct operation of all security functions.

    &lt;VulnDiscussion&gt;Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...
    Rule Medium Severity
  • SRG-OS-000446

    <GroupDescription></GroupDescription>
    Group
  • The VMM must perform verification of the correct operation of security functions: upon system startup and/or restart; upon command by a user with privileged access; and/or every 30 days.

    &lt;VulnDiscussion&gt;Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...
    Rule Medium Severity
  • SRG-OS-000447

    <GroupDescription></GroupDescription>
    Group
  • The VMM must shut down, restart, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.

    &lt;VulnDiscussion&gt;If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hard...
    Rule Medium Severity
  • SRG-OS-000458

    <GroupDescription></GroupDescription>
    Group
  • The VMM must generate audit records when successful/unsuccessful attempts to access security objects occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000460

    <GroupDescription></GroupDescription>
    Group
  • The VMM must generate audit records when successful/unsuccessful attempts to access security levels occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000461

    <GroupDescription></GroupDescription>
    Group
  • The VMM must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000462

    <GroupDescription></GroupDescription>
    Group
  • The VMM must generate audit records when successful/unsuccessful attempts to modify privileges occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000463

    <GroupDescription></GroupDescription>
    Group
  • The VMM must generate audit records when successful/unsuccessful attempts to modify security objects occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000464

    <GroupDescription></GroupDescription>
    Group
  • The VMM must generate audit records when successful/unsuccessful attempts to modify security levels occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules